Windows Analysis Report
https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/

Overview

General Information

Sample URL: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/
Analysis ID: 1446163
Infos:

Detection

HTMLPhisher
Score: 76
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

AI detected phishing page
Antivirus / Scanner detection for submitted sample
Yara detected HtmlPhish10
AI detected suspicious javascript
Phishing site detected (based on image similarity)
Phishing site detected (based on logo match)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML title does not match URL

Classification

AV Detection

barindex
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ Avira URL Cloud: detection malicious, Label: phishing
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ SlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering

Phishing

barindex
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ LLM: Score: 8 brands: Microsoft OneDrive Reasons: The URL 'https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/' does not match the legitimate domain name for Microsoft OneDrive, which should be something like 'onedrive.live.com'. The use of IPFS (InterPlanetary File System) for hosting a OneDrive page is highly unusual and suspicious. The page mimics the appearance of a legitimate OneDrive page, which is a common social engineering technique used in phishing attacks. DOM: 0.0.pages.csv
Source: Yara match File source: 0.0.pages.csv, type: HTML
Source: Yara match File source: 0.1.pages.csv, type: HTML
Source: Yara match File source: dropped/chromecache_61, type: DROPPED
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ LLM: Score: 8 Reasons: The JavaScript code captures form data and sends it to an external URL (https://notmark.name.ng/dell/zob.php) via an AJAX POST request. This behavior is typical of phishing attacks where user credentials or other sensitive information are harvested. Additionally, the URL used does not appear to be associated with a legitimate or well-known service, increasing the likelihood of malicious intent. DOM: 0.0.pages.csv
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ Matcher: Found strong image similarity, brand: MICROSOFT
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ Matcher: Template: onedrive matched
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ Matcher: Template: microsoft matched
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: Number of links: 0
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: Title: does not match URL
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: <input type="password" .../> found
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: No favicon
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: No favicon
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: No <meta name="author".. found
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: No <meta name="author".. found
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: No <meta name="copyright".. found
Source: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP Parser: No <meta name="copyright".. found
Source: unknown HTTPS traffic detected: 2.19.104.72:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 2.19.104.72:443 -> 192.168.2.4:49773 version: TLS 1.2
Source: unknown TCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknown TCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknown TCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown TCP traffic detected without corresponding DNS query: 2.19.104.72
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/ HTTP/1.1Host: ipfs.ioConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /shared/5/images/microsoft_logo_ee5c8d9fb6248c938fd0.svg HTTP/1.1Host: logincdn.msftauth.netConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ipfs.io/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: ipfs.ioConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: ipfs.techConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ipfs.io/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global traffic HTTP traffic detected: GET /shared/5/images/microsoft_logo_ee5c8d9fb6248c938fd0.svg HTTP/1.1Host: logincdn.msftauth.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: ipfs.techConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic DNS traffic detected: DNS query: ipfs.io
Source: global traffic DNS traffic detected: DNS query: cdn.jsdelivr.net
Source: global traffic DNS traffic detected: DNS query: cdn.glitch.global
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic DNS traffic detected: DNS query: logincdn.msftauth.net
Source: global traffic DNS traffic detected: DNS query: ipfs.tech
Source: chromecache_61.1.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/3.6.4/jquery.min.js
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/1.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/2.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/3.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/4.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/5.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/a.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/aa.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/b.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/c.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/d.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/e.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.glitch.global/3b26bc0d-3c39-44da-a49e-84aefc634cd2/f.png
Source: chromecache_61.1.dr String found in binary or memory: https://cdn.jsdelivr.net/npm/bootstrap
Source: chromecache_76.1.dr, chromecache_49.1.dr String found in binary or memory: https://getbootstrap.com/)
Source: chromecache_76.1.dr, chromecache_49.1.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/main/LICENSE)
Source: chromecache_76.1.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: chromecache_61.1.dr String found in binary or memory: https://logincdn.msftauth.net/shared/5/images/microsoft_logo_ee5c8d9fb6248c938fd0.svg
Source: chromecache_61.1.dr String found in binary or memory: https://notmark.name.ng/dell/zob.php
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49675 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49787
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49753
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49773
Source: unknown Network traffic detected: HTTP traffic on port 49678 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49771
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49770
Source: unknown Network traffic detected: HTTP traffic on port 49787 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49770 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49773 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49778 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 49753 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 49771 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49778
Source: unknown HTTPS traffic detected: 2.19.104.72:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 2.19.104.72:443 -> 192.168.2.4:49773 version: TLS 1.2
Source: classification engine Classification label: mal76.phis.win@16/52@18/8
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2200,i,8465809809260521268,2692650552825108474,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ipfs.io/ipfs/QmcZHgPdjzKZwSiGDPgHLVRcxMeWQsVgbWsmJC6BiQv1cS/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2200,i,8465809809260521268,2692650552825108474,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs